About your Search

20130416
20130424
Search Results 0 to 4 of about 5
and stealth technology and ability to fight at supersonic speeds. it may be the way it has been able to avoid the budget cutters in washington. ha >> "washington journal," continues. host: we are talking about the roles of security cameras in asian oil security. welcome to the program. talk to us about your thoughts and feelings regarding the role of public and private cameras in national security and the impact of these cameras. seen what we have historically is that public cameras are not good at preventing crime. this has come up in the context of london and the united kingdom, which has some of the largest, most saturated cctv areas. the studies have shown that these cameras are not good for prevention purposes. the next question is are they good for solving crimes? what we have seen in london, which is one of the most saturated areas, is that the cameras are not good at solving crimes. a police steady in london shows that for every 1000 camera there was only one crime that was solved. you have a question of effectiveness. what we see is that they are not. we hear. they did not help to so
, the advancing america's networking and information technology research and development act of 2013. h.r. 967 is a good bipartisan bill which i was pleased to join mrs. lummis from wyoming and mr. hall from texas in introducing. h.r. 967 is largely based on a 2009 house-passed bill that was ntroduced by then-chairman gordon and ranking member hull. but this has some updates and reflects changing to the -- changes to the information and technology landscape as well as policy and management recommendations made by an outside panel of experts charged with evaluating nitr-d program. the program involves a collaboration of 15 federal resedge and development agencies, each contributing its own unique expertise and effort. to ensure that we make most effective use of our federal r&d resources and remain a leader in these fields. h.r. 967 requires that all 15 agencies come together to develop and periodically update a strategic plan for federal invest. s in -- investments in i.t. r&d. h.r. 967 will increase support, calls for increased support for large scale long-term interdisciplinary research in i
and can only respond to known threats. cyberthreats evolve at the speefed technology and this measure helps the private sector protect against cyberattacks by providing companies with the latest cyberthreat information from the intelligence community which has timely classified information about destructive malware. this cyberthreat intelligence is the information that companies and the government need to protect and defend their networks. the so-called signatures are primarily made up of numerical codes consisting of zeros and ones without any perm information attached. -- any personal information atammed. cispa is a result of cooperation between the community, companies and to a certain degree the white house as it pertains to many measures included in this legislation. during their efforts to improve the bill, they also maintain a dialogue with privacy advocates in an effort to strengthen civil liberties, protections and oversights. i had a personal note here for the reason that over a period of 10 years i served eight of those years on the intelligence committee. and the now chair
and the military side. i've constantly tried to improve how we address the need for the next generation technology, public-private cooperation and ensuring that we have the price personnel to counter this 21st century cyberthreat. however, i am uncompromising in safeguarding the rights of our citizens and i will never sacrifice our civil liberties for unneeded intrusion. to this end, the amendment i am offering today would strengthen existing provisions in the bill to include the privacy officer and the officer for civil rights and civil liberties of the department of homeland security askey stakeholders in the report that would a-- as key stakeholders in the report. this report would assess how this legislation affected our civil liberties and privacy throughout our federal government, and the department of homeland security is the -- the key civil department in our federal government that develops and implements cybersecurity protocalls for the rest of the -- protocols for the rest of the federal government. it is crucial that they be part of any assessment and work with both the privacy office
to our critical infrastructure. >> how do you work to prevent this? >> we have technology, cyber technologies, prevention technologies. we spend a lot of time now on technologies.
Search Results 0 to 4 of about 5

Terms of Use (10 Mar 2001)